{"component": "clause", "props": {"groups": [{"samples": [{"hash": "9TQZJb1CfBV", "uri": "/contracts/9TQZJb1CfBV#assigned-security-responsibility", "label": "Data Processing Agreement", "score": 35.9657554626, "published": true}, {"hash": "lHbZ4DWBU9S", "uri": "/contracts/lHbZ4DWBU9S#assigned-security-responsibility", "label": "Data Processing Agreement", "score": 35.9077453613, "published": true}, {"hash": "4LPwyQTVXWU", "uri": "/contracts/4LPwyQTVXWU#assigned-security-responsibility", "label": "Data Processing Agreement", "score": 35.8044242859, "published": true}], "snippet_links": [{"key": "responsibility-for", "type": "clause", "offset": [10, 28]}, {"key": "the-development", "type": "clause", "offset": [29, 44]}, {"key": "maintenance-of", "type": "clause", "offset": [66, 80]}, {"key": "information-security-program", "type": "clause", "offset": [85, 113]}, {"key": "security-official", "type": "definition", "offset": [143, 160]}, {"key": "overall-responsibility", "type": "clause", "offset": [166, 188]}, {"key": "security-roles-and-responsibilities", "type": "clause", "offset": [202, 237]}, {"key": "for-individuals", "type": "definition", "offset": [238, 253]}, {"key": "security-responsibilities", "type": "clause", "offset": [259, 284]}, {"key": "security-council", "type": "definition", "offset": [307, 323]}, {"key": "management-representatives", "type": "clause", "offset": [355, 381]}, {"key": "on-a-regular-basis", "type": "definition", "offset": [390, 408]}], "snippet": "Assigning responsibility for the development, implementation, and maintenance of its Information Security Program, including:\na) Designating a security official with overall responsibility;\nb) Defining security roles and responsibilities for individuals with security responsibilities; and\nc) Designating a Security Council consisting of cross-functional management representatives to meet on a regular basis.", "size": 44, "hash": "a125271ac2188fafc725c1090d8aba0c", "id": 1}, {"samples": [{"hash": "FunHoTxksx", "uri": "/contracts/FunHoTxksx#assigned-security-responsibility", "label": "Staffing Services Agreement", "score": 23.5800323486, "published": true}, {"hash": "iB6wFFVdqEc", "uri": "/contracts/iB6wFFVdqEc#assigned-security-responsibility", "label": "Staffing Services Agreement", "score": 22.8241024017, "published": true}, {"hash": "6hBfic0T8Uv", "uri": "/contracts/6hBfic0T8Uv#assigned-security-responsibility", "label": "Services Agreement", "score": 22.5175170898, "published": true}], "snippet_links": [{"key": "contractor-shall", "type": "clause", "offset": [0, 16]}, {"key": "security-official", "type": "definition", "offset": [29, 46]}, {"key": "responsible-for", "type": "clause", "offset": [47, 62]}, {"key": "the-development", "type": "clause", "offset": [63, 78]}, {"key": "maintenance-of", "type": "clause", "offset": [100, 114]}, {"key": "information-security-program", "type": "clause", "offset": [119, 147]}], "snippet": "Contractor shall designate a security official responsible for the development, implementation, and maintenance of its Information Security Program. Contractor shall inform Company as to the person responsible for security.", "size": 9, "hash": "a2b64c64860ae771befbd97bc496e812", "id": 2}, {"samples": [{"hash": "4zxj8Qh9gnr", "uri": "/contracts/4zxj8Qh9gnr#assigned-security-responsibility", "label": "Customer Agreement", "score": 36.3324317932, "published": true}, {"hash": "fJ6BujZGagh", "uri": "/contracts/fJ6BujZGagh#assigned-security-responsibility", "label": "Customer Agreement", "score": 32.8144798279, "published": true}, {"hash": "99Ob4nHX7ka", "uri": "/contracts/99Ob4nHX7ka#assigned-security-responsibility", "label": "Data Processing Addendum", "score": 27.6502399445, "published": true}], "snippet_links": [{"key": "responsibility-for", "type": "clause", "offset": [10, 28]}, {"key": "the-development", "type": "clause", "offset": [29, 44]}, {"key": "maintenance-of", "type": "clause", "offset": [66, 80]}, {"key": "security-program", "type": "clause", "offset": [92, 108]}, {"key": "security-official", "type": "definition", "offset": [137, 154]}, {"key": "overall-responsibility", "type": "clause", "offset": [160, 182]}, {"key": "security-roles-and-responsibilities", "type": "clause", "offset": [195, 230]}, {"key": "for-individuals", "type": "definition", "offset": [231, 246]}, {"key": "security-responsibilities", "type": "clause", "offset": [252, 277]}, {"key": "security-council", "type": "definition", "offset": [299, 315]}, {"key": "management-representatives", "type": "clause", "offset": [347, 373]}, {"key": "on-a-regular-basis", "type": "definition", "offset": [382, 400]}], "snippet": "Assigning responsibility for the development, implementation, and maintenance of Moveworks\u2019 security program, including: \u2022 Designating a security official with overall responsibility; \u2022 Defining security roles and responsibilities for individuals with security responsibilities; and \u2022 Designating a Security Council consisting of cross-functional management representatives to meet on a regular basis.", "size": 3, "hash": "0dcdc3c866a96d4d22775d4f1ab9d1ba", "id": 3}, {"samples": [{"hash": "gnicOgm67ji", "uri": "/contracts/gnicOgm67ji#assigned-security-responsibility", "label": "Master Services Agreement", "score": 25.4646472931, "published": true}, {"hash": "8PdTPAQnT3I", "uri": "/contracts/8PdTPAQnT3I#assigned-security-responsibility", "label": "Services Agreement", "score": 25.3195667267, "published": true}, {"hash": "aEHs2UGCKp1", "uri": "/contracts/aEHs2UGCKp1#assigned-security-responsibility", "label": "Software Service Loan Agreement", "score": 24.9582328796, "published": true}], "snippet_links": [{"key": "vendor-will", "type": "clause", "offset": [0, 11]}, {"key": "management-level", "type": "clause", "offset": [24, 40]}, {"key": "security-official", "type": "definition", "offset": [50, 67]}, {"key": "by-vendor", "type": "clause", "offset": [77, 86]}, {"key": "responsible-for", "type": "clause", "offset": [87, 102]}, {"key": "the-development", "type": "clause", "offset": [103, 118]}, {"key": "maintenance-of", "type": "clause", "offset": [148, 162]}, {"key": "information-security-program", "type": "clause", "offset": [167, 195]}, {"key": "appointed-official", "type": "definition", "offset": [201, 219]}, {"key": "security-credentials", "type": "clause", "offset": [265, 285]}, {"key": "designated-official", "type": "definition", "offset": [332, 351]}, {"key": "contact-information", "type": "clause", "offset": [377, 396]}, {"key": "upon-request", "type": "definition", "offset": [402, 414]}, {"key": "a-copy-of", "type": "clause", "offset": [416, 425]}, {"key": "the-vendor", "type": "clause", "offset": [471, 481]}, {"key": "right-to-terminate-the-agreement", "type": "clause", "offset": [553, 585]}, {"key": "without-liability", "type": "clause", "offset": [586, 603]}], "snippet": "Vendor will designate a management level or above security official employed by Vendor responsible for the development, implementation, and ongoing maintenance of its Information Security Program. The appointed official will have appropriate recognized Information Security credentials and qualifications. Vendor will identify such designated official, provide such official\u2019s contact information and, upon request, a copy of his/her information security credentials. If the Vendor fails to designate such a highly-qualified official, SPE will have the right to terminate the agreement without liability.", "size": 3, "hash": "000d88d4eabccafb21bcb1fa321690ed", "id": 4}, {"samples": [{"hash": "eJKLCsqQahe", "uri": "/contracts/eJKLCsqQahe#assigned-security-responsibility", "label": "Cloud Agreement", "score": 22.9007530212, "published": true}, {"hash": "8yGYTogYHkC", "uri": "/contracts/8yGYTogYHkC#assigned-security-responsibility", "label": "Master Software License, Maintenance & Professional Services Agreement", "score": 22.8514709473, "published": true}], "snippet_links": [{"key": "security-responsibility", "type": "clause", "offset": [38, 61]}, {"key": "service-provider-organization", "type": "definition", "offset": [106, 135]}, {"key": "supervision-of-the", "type": "clause", "offset": [190, 208]}, {"key": "security-measures", "type": "definition", "offset": [216, 233]}, {"key": "conduct-of-personnel", "type": "clause", "offset": [242, 262]}], "snippet": "Assign and document the assignment of security responsibility to a specific individual or role within the service provider organization. This responsibility would include the management and supervision of the use of security measures and the conduct of personnel.", "size": 3, "hash": "c4f79177ca48b1e1ce6aea774d62a444", "id": 5}, {"samples": [{"hash": "F3F8tXTch5", "uri": "/contracts/F3F8tXTch5#assigned-security-responsibility", "label": "Data Privacy & Security", "score": 24.295003891, "published": true}, {"hash": "7bTHj4y0aKE", "uri": "/contracts/7bTHj4y0aKE#assigned-security-responsibility", "label": "Data Privacy & Security", "score": 24.295003891, "published": true}], "snippet_links": [{"key": "seller-shall", "type": "clause", "offset": [0, 12]}, {"key": "security-official", "type": "definition", "offset": [25, 42]}, {"key": "responsible-for", "type": "clause", "offset": [43, 58]}, {"key": "the-development", "type": "clause", "offset": [59, 74]}, {"key": "systems-and-procedures", "type": "clause", "offset": [132, 154]}, {"key": "information-security-program", "type": "clause", "offset": [162, 190]}, {"key": "to-ensure", "type": "clause", "offset": [191, 200]}, {"key": "reviewed-by", "type": "definition", "offset": [327, 338]}, {"key": "independent-third-parties", "type": "definition", "offset": [339, 364]}, {"key": "security-programs", "type": "definition", "offset": [424, 441]}, {"key": "adjust-the-program", "type": "clause", "offset": [443, 461]}, {"key": "the-information", "type": "clause", "offset": [524, 539]}, {"key": "changes-in-technology", "type": "clause", "offset": [582, 603]}, {"key": "industry-security-standards", "type": "definition", "offset": [607, 634]}, {"key": "to-seller", "type": "clause", "offset": [703, 712]}, {"key": "work-orders", "type": "clause", "offset": [762, 773]}, {"key": "business-arrangements", "type": "clause", "offset": [801, 822]}, {"key": "mergers-and-acquisitions", "type": "clause", "offset": [832, 856]}, {"key": "joint-ventures", "type": "definition", "offset": [872, 886]}, {"key": "information-systems", "type": "definition", "offset": [929, 948]}], "snippet": "Seller shall designate a security official responsible for the development, Testing \u2013 Seller shall regularly test the key controls, systems and procedures of its Information Security Program to ensure that they are properly implemented and effective in addressing the threats and risks identified. Tests should be conducted or reviewed by independent third parties or staff independent of those that develop or maintain the security programs. Adjust the Program \u2013 Seller shall monitor, evaluate, and adjust, as appropriate, the Information Security Program in light of any relevant changes in technology or industry security standards, the sensitivity of the Raytheon Data, internal or external threats to Seller or the Raytheon Data, requirements of applicable work orders, and Seller\u2019s own changing business arrangements, such as mergers and acquisitions, alliances and joint ventures, outsourcing arrangements, and changes to information systems.", "size": 2, "hash": "98c5b0b2c56869ec8567988614656e3e", "id": 6}, {"samples": [{"hash": "3LEYQazPVHy", "uri": "/contracts/3LEYQazPVHy#assigned-security-responsibility", "label": "Data Processing Addendum", "score": 34.1401824951, "published": true}, {"hash": "53Kd3aTMUf1", "uri": "/contracts/53Kd3aTMUf1#assigned-security-responsibility", "label": "Data Processing Addendum", "score": 33.8163566589, "published": true}], "snippet_links": [{"key": "vendor-shall", "type": "clause", "offset": [0, 12]}, {"key": "security-official", "type": "definition", "offset": [25, 42]}, {"key": "responsible-for", "type": "clause", "offset": [43, 58]}, {"key": "the-development", "type": "clause", "offset": [59, 74]}, {"key": "maintenance-of", "type": "clause", "offset": [96, 110]}, {"key": "information-security-program", "type": "clause", "offset": [115, 143]}], "snippet": "Vendor shall designate a security official responsible for the development, implementation, and maintenance of its Information Security Program. Vendor shall inform Company as to the person responsible for security.", "size": 2, "hash": "6e20a46e200ed81beee985dbc74bf80d", "id": 7}, {"samples": [{"hash": "5p70Md8mGBX", "uri": "/contracts/5p70Md8mGBX#assigned-security-responsibility", "label": "Consultant Services Agreement", "score": 24.5558395386, "published": true}, {"hash": "29jUiFzcmpv", "uri": "/contracts/29jUiFzcmpv#assigned-security-responsibility", "label": "Consultant Services Agreement", "score": 24.1972446442, "published": true}], "snippet_links": [{"key": "consultant-shall", "type": "clause", "offset": [0, 16]}, {"key": "security-official", "type": "definition", "offset": [29, 46]}, {"key": "responsible-for", "type": "clause", "offset": [47, 62]}, {"key": "the-development", "type": "clause", "offset": [63, 78]}, {"key": "maintenance-of", "type": "clause", "offset": [100, 114]}, {"key": "information-security-program", "type": "clause", "offset": [119, 147]}], "snippet": "Consultant shall designate a security official responsible for the development, implementation, and maintenance of its Information Security Program. Consultant shall inform Company as to the person responsible for security.", "size": 2, "hash": "f5ada4d801847af171be08253fbd6cfd", "id": 8}, {"samples": [{"hash": "8vD73H2lbEH", "uri": "/contracts/8vD73H2lbEH#assigned-security-responsibility", "label": "Data Processing Agreement", "score": 27.7310066223, "published": true}], "snippet_links": [{"key": "designated-security-official", "type": "definition", "offset": [10, 38]}, {"key": "responsible-for", "type": "clause", "offset": [39, 54]}, {"key": "the-development", "type": "clause", "offset": [55, 70]}, {"key": "security-program", "type": "clause", "offset": [111, 127]}], "snippet": "A10 has a designated security official responsible for the development, implementation, and maintenance of the Security Program.", "size": 1, "hash": "1b720319a8b4881012b90b20ccc9a101", "id": 9}, {"samples": [{"hash": "7DrR1zkpGGR", "uri": "/contracts/7DrR1zkpGGR#assigned-security-responsibility", "label": "Master Services Agreement", "score": 23.6877708435, "published": true}], "snippet_links": [{"key": "contractor-will", "type": "clause", "offset": [0, 15]}, {"key": "security-official", "type": "definition", "offset": [28, 45]}, {"key": "responsible-for", "type": "clause", "offset": [46, 61]}, {"key": "the-development", "type": "clause", "offset": [62, 77]}, {"key": "maintenance-of", "type": "clause", "offset": [98, 112]}, {"key": "information-security-program", "type": "clause", "offset": [117, 145]}, {"key": "systems-and-procedures", "type": "clause", "offset": [280, 302]}, {"key": "to-ensure", "type": "clause", "offset": [339, 348]}, {"key": "reviewed-by", "type": "definition", "offset": [475, 486]}, {"key": "independent-third-parties", "type": "definition", "offset": [487, 512]}, {"key": "security-programs", "type": "definition", "offset": [572, 589]}, {"key": "adjust-the-program", "type": "clause", "offset": [591, 609]}, {"key": "the-information", "type": "clause", "offset": [674, 689]}, {"key": "changes-in-technology", "type": "clause", "offset": [732, 753]}, {"key": "industry-security-standards", "type": "definition", "offset": [757, 784]}, {"key": "personal-data", "type": "clause", "offset": [805, 818]}, {"key": "work-orders", "type": "clause", "offset": [908, 919]}, {"key": "business-arrangements", "type": "clause", "offset": [951, 972]}, {"key": "mergers-and-acquisitions", "type": "clause", "offset": [982, 1006]}, {"key": "joint-ventures", "type": "definition", "offset": [1022, 1036]}, {"key": "information-systems", "type": "definition", "offset": [1079, 1098]}, {"key": "access-to-facilities", "type": "clause", "offset": [1169, 1189]}, {"key": "records-and-supporting-documentation", "type": "clause", "offset": [1200, 1236]}, {"key": "in-order-to", "type": "clause", "offset": [1237, 1248]}, {"key": "audit-contractor", "type": "clause", "offset": [1249, 1265]}, {"key": "compliance-with", "type": "clause", "offset": [1268, 1283]}, {"key": "related-to", "type": "definition", "offset": [1309, 1319]}, {"key": "subject-to", "type": "definition", "offset": [1369, 1379]}, {"key": "confidentiality-obligations", "type": "clause", "offset": [1395, 1422]}, {"key": "by-company", "type": "clause", "offset": [1433, 1443]}, {"key": "of-contractor", "type": "clause", "offset": [1524, 1537]}, {"key": "services-and", "type": "clause", "offset": [1555, 1567]}, {"key": "normal-operations", "type": "clause", "offset": [1574, 1591]}], "snippet": "Contractor will designate a security official responsible for the development, implementation and maintenance of its Information Security Program. Contractor will inform Company as to the person responsible for security. Testing \u2013 Contractor will regularly test the key controls, systems and procedures of its Information Security Program to ensure that they are properly implemented and effective in addressing the threats and risks identified. Tests should be conducted or reviewed by independent third parties or staff independent of those that develop or maintain the security programs. Adjust the Program \u2013 Contractor will monitor, evaluate and adjust, as appropriate, the Information Security Program in light of any relevant changes in technology or industry security standards, the sensitivity of Personal Data, internal or external threats to Contractor or Personal Data, requirements of applicable work orders, and Contractor\u2019s own changing business arrangements, such as mergers and acquisitions, alliances and joint ventures, outsourcing arrangements, and changes to information systems. Company may request upon ten (10) days\u2019 written notice to Contractor access to facilities, systems, records and supporting documentation in order to audit Contractor\u2019s compliance with its obligations under or related to its Information Security Program. Audits will be subject to all applicable confidentiality obligations agreed to by Company and Contractor, and will be conducted in a manner that minimizes any disruption of Contractor\u2019s performance of services and other normal operations.", "size": 1, "hash": "4010c2d208a3d3bbb921266f09a8cae4", "id": 10}], "next_curs": "CmkSY2oVc35sYXdpbnNpZGVyY29udHJhY3RzckULEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Iilhc3NpZ25lZC1zZWN1cml0eS1yZXNwb25zaWJpbGl0eSMwMDAwMDAwYQyiAQJlbhgAIAA=", "clause": {"parents": [["miscellaneous", "Miscellaneous"], ["data-privacy-and-information-security", "DATA PRIVACY AND INFORMATION SECURITY"], ["permissible-requests", "PERMISSIBLE REQUESTS"], ["general-provisions", "General Provisions"], ["definitions", "Definitions"]], "children": [], "title": "Assigned Security Responsibility", "size": 86, "id": "assigned-security-responsibility", "related": [["city-responsibilities", "City Responsibilities", "City Responsibilities"], ["university-responsibilities", "University Responsibilities", "University Responsibilities"], ["union-responsibility", "Union Responsibility", "Union Responsibility"], ["primary-responsibility", "Primary Responsibility", "Primary Responsibility"], ["agency-responsibilities", "Agency Responsibilities", "Agency Responsibilities"]], "related_snippets": [], "updated": "2025-07-23T06:14:19+00:00", "also_ask": [], "drafting_tip": "", "explanation": "The Assigned Security Responsibility clause designates a specific individual or role within an organization to oversee and manage information security obligations. This person is tasked with implementing security policies, monitoring compliance, and serving as the primary contact for security-related issues or incidents. By clearly assigning responsibility, the clause ensures accountability and helps prevent lapses in security management, thereby reducing the risk of data breaches or non-compliance with regulatory requirements."}, "json": true, "cursor": ""}}